• eIDAS Regulation

    Since July 2016, the eIDAS Regulation (Regulation N910/2014) on electronic identification and trust services for electronic transactions is applicable for all member states of the EU. This means that the regulation sets are a...


  • Electronic signature

    The law recognizes different levels of electronic signatures, which can be used as a replacement for the handwritten signature. According to European Law, a qualified electronic signature (QES) is as legally valid as a handwr...


  • Hardware Signing Module (HSM)

    What is a Hardware Security Module? Hardware Security Modules (HSM) offer reliable protection for applications, transactions and information through encryption. A Hardware Security Module is a secured piece of hardware in wh...


  • Installation Code Signing Certificate or Email Certificate

    When requesting an Email certificate (client certificate) or Code Signing certificate your browser can automatically create the CSR. It is also possible to specify the CSR manually, but in this manual we assume that the autom...


  • Request Code Signing Certificate or Email Certificate

    For requesting an email or code signing certificate a CSR is required. This can be generated during the request of the certificate with Internet Explorer or Firefox. The functionality is not available in Chrome. It's also pos...


  • Timestamping

    A digital signature proves who has signed a file. A time stamp shows when the file was signed. This is comparable to signing a document in the presence of a notary. In this case the notary witnesses both the identity of the s...


  • USB tokens

    What is a USB-Token? A USB-token, also called a PKI token is used to store a digital signature which is subsequently used to sign or log in. Due to the use of advanced encryption, PKI is considered to be the safest method of...



Our SSLCheck will examine your website's root and intermediate certificates for correctness and report any potential issues

point up